Searching in Data Privacy & Cybersecurity · Search everything

679 changes Data Privacy & Cybersecurity

Favicon for www.csa.gov.sg

SingCERT Security Bulletin Summarizes NIST Vulnerability Database

The Cyber Security Agency of Singapore (CSA) SingCERT published a security bulletin summarizing critical vulnerabilities from NIST's National Vulnerability Database. The bulletin categorizes CVEs by CVSSv3 base scores, listing vulnerabilities scoring 9.0-10.0 (Critical), 7.0-8.9 (High), 4.0-6.9 (Medium), and 0.1-3.9 (Low). Critical vulnerabilities include Axios prototype pollution (CVE-2026-40175, score 10.0), Sonicverse SSRF (CVE-2026-40089, score 9.9), SAP SQL injection (CVE-2026-27681, score 9.9), Axios proxy bypass (CVE-2025-62718, score 9.9), and PraisonAI sandbox escape (CVE-2026-39888, score 9.9).

Priority review Guidance Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Vulnerabilities in Synology SSL VPN Client Prior to 1.4.5-0684

CERT-FR published advisory CERTFR-2026-AVI-0431 alerting to multiple vulnerabilities in Synology SSL VPN Client affecting versions prior to 1.4.5-0684. The vulnerabilities could allow attackers to compromise data confidentiality and integrity. The advisory references Synology security bulletin Synology_SA_26_05 and two CVEs (CVE-2021-47960 and CVE-2021-47961). Organizations using the affected product should consult the vendor's security bulletin for patch information.

Priority review Notice Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Vulnerabilities in SAP Products Allow Remote Code Execution

CERT-FR published advisory CERTFR-2026-AVI-0434 alerting organizations that multiple vulnerabilities have been discovered in SAP products. Affected systems span SAP NetWeaver Application Server ABAP and Java, S/4HANA, BusinessObjects, and numerous other SAP platforms across versions 700-816. The vulnerabilities expose organizations to remote code execution, SQL injection, cross-site scripting, denial of service, and data confidentiality breaches.

Priority review Notice Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Microsoft Product Vulnerabilities, 4 CVEs

CERT-FR issued advisory CERTFR-2026-AVI-0435 warning of four unpatched vulnerabilities (CVE-2026-27456, CVE-2026-3184, CVE-2026-34933, CVE-2026-4878) in Microsoft products affecting azl3 and cbl2 system versions. The vulnerabilities allow attackers to cause unspecified security issues. Organizations running affected azl3 versions of avahi, libcap, and util-linux, or cbl2 versions of avahi and libcap, should apply patches per Microsoft security bulletins.

Priority review Notice Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Vulnerabilities in Siemens Products Allow Remote Code Execution

CERT-FR issued security advisory CERTFR-2026-AVI-0432 detailing multiple vulnerabilities in Siemens industrial automation products including SCALANCE W-700, SIMATIC CN/Field/IPC series, and related industrial computing devices. The vulnerabilities enable remote code execution, privilege escalation, denial of service, cross-site scripting, and data confidentiality breaches. Affected parties should immediately consult Siemens security bulletins SSA-019200 and SSA-628843 for available patches and apply mitigations.

Priority review Notice Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Vulnerabilities in Python Allowing Remote Code Execution

CERT-FR issued advisory CERTFR-2026-AVI-0430 warning of multiple vulnerabilities in Python/CPython affecting systems without latest security patches. Two CVEs are referenced: CVE-2026-4786 and CVE-2026-6100. The vulnerabilities allow remote code execution and other unspecified security issues. Organizations running CPython should consult vendor security bulletins for patches.

Priority review Guidance Cybersecurity
Favicon for www.cert.ssi.gouv.fr

Multiple Schneider Electric Vulnerabilities, Data Integrity and Confidentiality Risk

CERT-FR published advisory CERTFR-2026-AVI-0433 disclosing multiple vulnerabilities in Schneider Electric industrial control products. Affected products include Easergy MiCOM protection relays (multiple models), EcoStruxure Control Expert, Connexium Managed Switches, and Modicon Redundancy Switches. The vulnerabilities enable remote denial of service, data confidentiality breaches, data integrity compromise, and security policy bypass. Organizations should refer to vendor security bulletins for patches.

Priority review Notice Cybersecurity
Favicon for wid.cert-bund.de

ESRI ArcGIS Multiple Vulnerabilities, CVSS 9.8 (Critical)

CERT-Bund issued a security advisory about multiple critical vulnerabilities in ESRI ArcGIS geographic information system software (versions 11.5 and 12.0) with a CVSS Base Score of 9.8 (critical) and Temporal Score of 8.5 (high). An attacker can exploit these vulnerabilities remotely to elevate privileges or bypass security measures. Organizations using affected ArcGIS products should apply available mitigations.

Urgent Notice Cybersecurity
Favicon for wid.cert-bund.de

MinIO Object Storage Multiple Authentication Bypass Vulnerabilities - CVSS 8.2

CERT-Bund issued security advisory WID-SEC-2026-1081 identifying multiple vulnerabilities in MinIO object storage software with CVSS Base Score 8.2 (High) and Temporal Score 7.1 (High). Remote anonymous attackers can exploit these flaws to bypass authentication and manipulate data. Affected version: Open Source MinIO prior to 2026-04-11T03-20-12Z.

Priority review Guidance Cybersecurity
Favicon for wid.cert-bund.de

Apache Airflow Vulnerabilities Allow Code Execution

Apache Airflow Vulnerabilities Allow Code Execution

Routine Notice

Showing 31–40 of 679 changes

1 2 3 4 5 6 68

Filters

Clear